Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks can also be made with smart devices that connect to the Internet, which can be infected and used as botnets. They use Deep Learning (D.L.) techniques like Convolutional Neural Network (C.N.N.) and variants of Recurrent Neural Networks (R.N.N.), such as Long Short-Term Memory (L.S.T.M.), Bidirectional L.S.T.M., Stacked L.S.T.M., and the Gat G.R.U.. These techniques have been used to detect (DDoS) attacks. The Portmap.csv file from the most recent DDoS dataset, CICDDoS2019, has been used to test D.L. approaches. Before giving the data to the D.L. approaches, the data is cleaned up. The pre-processed dataset is used to train and test the D.L. approaches. In the paper, we show how the D.L. approach works with multiple models and how they compare to each other.
This paper deals the prediction of the process of random spatial data of two properties, the first is called Primary variables and the second is called secondary variables , the method that were used in the prediction process for this type of data is technique Co-kriging , the method is usually used when the number of primary variables meant to predict for one of its elements is measured in a particular location a few (because of the cost or difficulty of obtaining them) compare with secondary variable which is the number of elements are available and highly correlated with primary variables, as was the&nbs
... Show MoreOwing to their cost-effectiveness and the natural abundance of magnesium, magnesium-ion batteries (MIBs) were introduced as encouraging alternatives to Lithium-ion batteries. Following the successful synthesis of carbon nano-tube, its B and N doped derivatives which were doped with B and N enjoyed the attention of researchers as novel anode materials (AM) for MIBs. Here, we investigated a BC2N nano-tube (BC2NNT) as an encouraging AM for MIBs. To have a deeper understanding of the electrochemical properties, cycling stability, specific capacity (SC) and the adsorption behavior of this nano-tube, first-principles density functional theory computations were performed. By performing NMR calculations, we identified two types of non-aromatic hexa
... Show MoreIn the present work, a density functional theory (DFT) calculation to simulate reduced graphene oxide (rGO) hybrid with zinc oxide (ZnO) nanoparticle's sensitivity to NO2 gas is performed. In comparison with the experiment, DFT calculations give acceptable results to available bond lengths, lattice parameters, X-ray photoelectron spectroscopy (XPS), energy gaps, Gibbs free energy, enthalpy, entropy, etc. to ZnO, rGO, and ZnO/rGO hybrid. ZnO and rGO show n-type and p-type semiconductor behavior, respectively. The formed p-n heterojunction between rGO and ZnO is of the staggering gap type. Results show that rGO increases the sensitivity of ZnO to NO2 gas as they form a hybrid. ZnO/rGO hybrid has a higher number of vacancies that can b
... Show MoreThe aim of the research was to investigate the use of non-parametric tests in the analysis of the questionnaire and how to choose the appropriate test for testing the hypothesis of the study of crime motives in Khartoum State. The data were collected through the primary sources by designing a questionnaire and distributed to a sample of inmates in Khartoum state; the data were analysis by SPSS program using the analytical statistical method through using some of the suitable non-parametric tests for each case. The most important results of the research were: there was significant relationship between the type of crime and the age group therefore, we found that the age group (20-29) was the most frequent crime particularly, the fi
... Show MoreThe purpose of this paper is to apply different transportation models in their minimum and maximum values by finding starting basic feasible solution and finding the optimal solution. The requirements of transportation models were presented with one of their applications in the case of minimizing the objective function, which was conducted by the researcher as real data, which took place one month in 2015, in one of the poultry farms for the production of eggs
... Show MoreRespiratory tract infections in sheep are among the important health problems that affect all sheep ages around the world. Nine bacterial isolates obtained from sheep with respiratory tract infections were selected to be used in the current study. The isolates included 3 Staphylococcus aureus, 4 Klebsiella pneumoniae, and 2 Pseudomonas aeruginosa. Following the primers design by the Primer3Plus software tool and optimization of the conventional polymerase chain reaction (PCR), the primers were validated for their use in the multiplex PCR experiments. The MFEprimer program was used to check the suitability of the primer set combinations for multiplex PCR. The MFEprimer software was successful in designing the multiplex-PCR experiments and de
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreBiomass has been extensively investigated, because of its presence as clean energy source. Tars and particulates formation problems are still the major challenges in development especially in the implementation of gasification technologies into nowadays energy supply systems. Laser Induced Fluorescence spectroscopy (LIF) method is incorporated for determining aromatic and Polycyclic Aromatic Hydrocarbons (PAH) produced at high temperature gasification technology. The effect of tars deposition when the gases are cooled has been highly reduced by introducing a new concept of measurement cell. The samples of PAH components have been prepared with the standard constrictions of measured PAHs by using gas chromatograph (GC). OPO laser with tun
... Show More